نتایج جستجو برای: code based cryptography

تعداد نتایج: 3061053  

2014
Aumreesh Saxena Sourabh Singh

The world It know today would be impossible without cryptography. This Paper are presenting study of cryptography and problem associating with existing encryption model is also presented. Furthermore this is proposing encryption model. This encryption model is based on the block cipher concept where it will be encrypt and decrypt any type of data file. The primary goal of this paper is to impro...

2018
Thomas Debris-Alazard Jean-Pierre Tillich

RankSign is a code-based signature scheme proposed to the NIST competition for postquantum cryptography [AGH17]. It is based on the rank metric and enjoys remarkably small key sizes, about 10KBytes for an intended level of security of 128 bits. It is also one of the fundamental blocks used in the rank metric identity based encryption scheme [GHPT17]. Unfortunately we will show that all the para...

Certificateless public key cryptography (CL-PKC) is a useful method in order to solve the problems of traditional public key infrastructure (i.e., large amount of computation, storage and communication costs for managing certificates) and ID-based public key cryptography (i.e., key escrow problem), simultaneously. A signcryption scheme is an important primitive in cryptographic protocols which ...

Journal: :IACR Cryptology ePrint Archive 2017
André Chailloux Thomas Debris-Alazard

Quantum secure signature schemes have a lot of attention recently, in particular because of the NIST call to standardize quantum safe cryptography. However, only few signature schemes can have concrete quantum security because of technical difficulties associated with the Quantum Random Oracle Model (QROM). In this paper, we show that code-based signature schemes based on the full domain hash p...

Journal: :CoRR 2017
Na Meng Stefan Nagy Daphne Yao Wenjie Zhuang Gustavo Arango Argoty

Java platform and third-party libraries provide functionalities to facilitate secure coding. However, misusing these functionalities can cost developers tremendous time and effort, or introduce security vulnerabilities in software. Prior research focused on the misuse of cryptography and SSL APIs, but did not explore the fundamental research question: what are the biggest challenges and vulnera...

2016
A. John Blesswin

Visual cryptography (VC) is a distinct type of secret sharing scheme which hides secret images in share images such that, when the shares are superimposed, a hidden secret image is revealed. It does not require the complex computational method to decode the secret information. The paper proposes a novel Quick Response (QR) code authentication system using Visual Cryptography. The passwords for ...

2003
Rita Vincenti

We have studied the linear codes associated: a) with the surfaces V r−1 2 of order r − 1 of PG(r, q), analyzing in detail the case r = 4; b) with the Schubert subvarieties of the Grassmannian varieties.

2007
NATASA ZIVIC CHRISTOPH RULAND

In this work, channel decoding is considered as a promising way for improvement of cryptographic functions. Use of MAC/H-MAC values and digital signatures is analyzed in a context of code concatenation, together with convolutional codes using MAP decoding algorithm. Soft Input Decryption method, which uses L-values from channel decoder, presents an efficient method for integrating cryptography ...

2016
Zhuo Wang Daniel D. Lee

OPTIMAL NEURAL CODES FOR NATURAL STIMULI

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید